Please use this identifier to cite or link to this item:
http://cmuir.cmu.ac.th/jspui/handle/6653943832/68450
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kanokwan Malang | en_US |
dc.contributor.author | Shuliang Wang | en_US |
dc.contributor.author | Aniwat Phaphuangwittayakul | en_US |
dc.contributor.author | Yuanyuan Lv | en_US |
dc.contributor.author | Hanning Yuan | en_US |
dc.contributor.author | Xiuzhen Zhang | en_US |
dc.date.accessioned | 2020-04-02T15:27:37Z | - |
dc.date.available | 2020-04-02T15:27:37Z | - |
dc.date.issued | 2020-05-01 | en_US |
dc.identifier.issn | 03784371 | en_US |
dc.identifier.other | 2-s2.0-85077700485 | en_US |
dc.identifier.other | 10.1016/j.physa.2019.123769 | en_US |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85077700485&origin=inward | en_US |
dc.identifier.uri | http://cmuir.cmu.ac.th/jspui/handle/6653943832/68450 | - |
dc.description.abstract | © 2019 Elsevier B.V. The inherent structure and substantial information on global terrorism network are often understood by identifying influential nodes. Recently, novel node identification methods are developed from different perspectives. Each of them has trade-offs and strengths. However, the algorithms for exploring the key influential nodes have been adopted unevenly in light of network extraction research. A set of nodes that is more favorable to define the core network structure is unclear. In this paper, we, therefore, present a comparative study of node identification methods over the global terrorism network. The new insight each method contributes to identifying key influential nodes and core network structure is investigated. Six comparative methods are verified by the SIR model and monotonicity index. We further elaborate on experimental analysis by applying the critical nodes from each method to extract the skeleton network. All extracted skeletons are eventually compared with the original network in terms of node correlation and network structural-equivalence. Thus, the comparison and results not only used to reflect the potential of different methods to a particular network structure but also guide us to select a method that works best for extracting the skeleton network of real-world global terrorism. | en_US |
dc.subject | Mathematics | en_US |
dc.subject | Physics and Astronomy | en_US |
dc.title | Identifying influential nodes of global terrorism network: A comparison for skeleton network extraction | en_US |
dc.type | Journal | en_US |
article.title.sourcetitle | Physica A: Statistical Mechanics and its Applications | en_US |
article.volume | 545 | en_US |
article.stream.affiliations | Beijing Institute of Technology | en_US |
article.stream.affiliations | RMIT University | en_US |
article.stream.affiliations | Chiang Mai University | en_US |
Appears in Collections: | CMUL: Journal Articles |
Files in This Item:
There are no files associated with this item.
Items in CMUIR are protected by copyright, with all rights reserved, unless otherwise indicated.